Monthly Archives: May 2009

Rick Robinette gives you the 411 on getting the best from your Blackberry Smartphone in these uncertain economic times.

The object of the this story is to demonstrate how I maximized the usage of a Blackberry Smartphone using one of the cheapest mobile phone plans out there. For the sake of this article, the model phone that I used for this project was the Blackberry Curve 8320 Smartphone.

If you do not know what a Blackberry is, I encourage to visit the Blackberry website [ CLICK HERE ] .

When it comes to mobile (cell) phones I cannot see myself conversing for a 1000 minutes (16.66 hours) a month. That is two workdays to me or time that I can allocate to other things where I can see results.

Please do not get me wrong, a mobile phone is very much needed in circumstances where your business or livelihood is dependent on quick communications. The plan which I currently use is a “pay as you go” plan (with T-Mobile). I have learned to discipline myself with the usage; PLUS I do not give my number out or use it for lengthy conversation.

I have always been fascinated with PDA’s, have owned quite a few, and was currently looking for something that would provide PDA capabilities, as well as, mobile phone capabilities. I did not want to pay a lot or get trapped into a lengthy service contract with a mobile phone provider just to own a computer in my pocket.

During a recent visit to the local mall I entered into my usual question and answer session with the sales rep at one of the T-Mobile kiosks. I have done this in the past at other locations in an effort to educate myself about mobile phones.

One of my primary questions has been, “What phones will my T-Mobile “pay-as-you-go” SIM card work in?”. You would be surprised at the answers I have received. I have always been told I would have to purchase another phone plan, if I wanted a Blackberry, etc…

Ultimately I always leave very confused about mobile phones. In this case, the sales rep proceeded to inform me that my SIM card in my cheapie phone would function in any of the phones they had. The sales rep proceeded to show me several phones including the Blackberry (all with heavy price tags if I were to buy the phone straight out).

As my “gadget luck” would have it, I was preparing to leave and the sales rep proceeds to tell me that he had an used Blackberry Curve 8320 for sale, minus the software for the phone.

Long story short, I get what I think is a good deal on this phone… I buy the phone and with my cheap “pay as you go” plan, I challenge myself (as a project) to find workarounds to getting data to and from the Blackberry without the need to purchase a high priced data plan.

Reflected below is highlights of how my project turned out… Some of the information alone may be helpful to other Blackberry owners and in some cases, depending on the phone (and provider), may not work at all. Some of the information reflected may be common information to mobile phone power users and may make me appear as if I don’t have a clue about mobile phones…

Well I don’t, but I am learning! All I can tell you is, that I took a cheap phone plan (pay-as-you-go) and an expensive smartphone and customized it for my personal needs.

SIM Card

SIM (Subscriber Identity Module) is the card located in your phone that is a module that identifies to the mobile phone provider, who you are. It can also serve as storage media for your contacts, etc… The module can usually be removed and swapped to other phones (with the same provider). In my case the SIM card worked with no problems and all my contacts were transferred to the Blackberry. I now have voice communications with the Blackberry using my “pay as you go” plan.

Coverage

My phone coverage improved noticeably. Locations where I could not get service, I now have service. Proves to me that some mobile phones are better in transmission and reception than others.

Blackberry Desktop Manager Software

Since there was no software with the smartphone to manage the phone from my computer, I had to go find the software on the internet. I easily located and downloaded the software from “Blackberry” and installed it on my PC .

The Desktop Manager Software is an integral piece that you need to keep your phone software up to date; AND to provide file management, software management, and backup capabilities.

The installation was also bundled with a Roxio package to manage and convert audio, video and photo files. After learning the Desktop Manager Software, I knew at that point this was my gateway for installing third party software onto Blackberry.

Calendar, Contact, and Task Management

In order to take full advantage of the calendar, contact and task management portion of the phone, I needed some type of syncing capabilities.

When I connect my Blackberry to my computer, run the Desktop Manager Software, it automatically syncs with my Yahoo account on the internet. This also gives me the ability to pull up my information from any PC connected to the internet.

Wi-Fi

The Blackberry Curve 8320 has wi-fi (wireless) capability. I configured the Blackberry to connect to the wireless router in my home, which provided me with (at first) limited access to the internet. You will see below the workaround I utilized to gain full access.

Internet Browser

The browser on this particular phone was very, very limited (proprietary to T-Mobile) and did not provide complete internet access via my wireless access point. I initially did not think this was possible without a data plan, but after some careful thinking, I knew there had to be some way that I could bridge that gap.

I downloaded and installed Opera-Mini which is browser software designed for mobile phones. I now have full access to the internet via my wireless router or at any Wi-Fi access point that will let me in. (Note: Opera-Mini is an awesome browser for this purpose).

MicroSD Card (with PC Adapter)

RadioShack had an 8 gig MicroSD memory card on sale ($20), which I installed into the Blackberry… I now have storage capability; plus when connecting the Blackberry to my computer it is recognized as a mass storage device.

Interested in an alternate operating system? Mark Schneider has some great advice on PC – BSD.

I recently downloaded and installed the latest versions of PC-BSD and I have to say I’m extremely impressed.

The install went fast (18 minutes), and it was extremely simple and straight forward. I downloaded the 7.02 version using the DVD option. Downloading using http went fairly quickly – I tried to use bit-torrent and there were simply not enough seeders to make it reasonable.

During the install you get the option of adding various additional components already on the DVD including FireFox 3.0, Thunderbird, and Open Office 3.0. Based on FreeBSD version 7.0 PC-BSD is stable and secure, the GUI is the new KDE 4.1.2 and I really enjoy it. Installing new apps is far easier and straight forward than Linux in my opinion, and I’m comparing it side by side with Kubuntu 8.10 which also uses the new version of KDE.

The secret to improving usability in PC-BSD is the PBI or Push button Installer or PC-BSD Installer. The .pbi extension has all the files needed to install the applications by simply double clicking the file; this is essentially the same as a setup.exe file in Windows or the .DMG file in OSX.

The pbi applications can be found at http://pbidir.com/ where a great variety of programs can be had. For more hard core Unix geeks the FreeBSD Ports are also available. FreeBSD Ports are similar to the apt-get found in Linux systems and any FreeBSD Port can be downloaded with all their packages and dependencies to install them in PC-BSD. But for beginners everything you’ll need not on the install DVD, will be found at pbi.dir.com site.

The default browser in KDE is Konqueror which is what the Safari browser was originally based on – it’s a very fast browser but I vastly prefer FireFox. FireFox on PC-BSD came with all the plug-ins installed to play YouTube video’s and to render most web pages as they were meant to be seen.

PC-BSD seems like the perfect OS for a Netbook. It’s lightweight and simple, and has great applications like the Flock browser available, which is perfect for social networking sites and cloud based email. Unfortunately, a Netbook isn’t in the budget right now but I’d love to hear from anyone who’s installed it on one.

I’ve tried at least a dozen different Linux distros over the past few years and although they all worked fine, I really feel PC-BSD has surpassed them in ease of use for the beginner.

There were a few issues though. Although it runs flawlessly on my desktop, PC-BSD did have a few problems on my Thinkpad R60. The ATI video card isn’t supported for 3D graphics and the proprietary driver available on Linux builds doesn’t work. It also had an issue with my Wi-Fi card, although it would connect it never showed better than a 25% signal despite being in the same room as the router.

The signal would also occasionally drop out only to reappear shortly afterward. So its worth looking through their support page and checking to see if your hardware is supported.

If you’re trying it on a laptop with network cards not supported, I’d hold off. Its main feature is simplicity, but that will go away quickly if your hardware has known issues – in that case Ubuntu, or Kubuntu, might be a better choice.

Despite the few glitches I still recommend PC-BSD. It’s well worth a try especially if you’re the sort of person who likes to try new Linux builds, or you are looking for a secure and stable operating system to put on your machine without shelling out for Windows.

Given the increasing number of Trojans, Spyware, Virus’, Phishing Scams, Identity Theft Scams, and other threats we now face, there is no one anti-malware tool that is likely to identify and remove all of this rogue malware that infests the cyber world.

So to ensure maximum safety, it’s important to have layered defenses in the ongoing fight against system infection.

The free edition of SUPERAntiSpyware is an excellent choice, as a secondary line of defense in this battle. This free version of the award winning program, with its easy to employ interface, is used by millions of people worldwide to protect their computers.

While SUPERAntiSpyware is well known for its high malware detection rate, it has not in the six months I have been testing it, discovered anything which the other anti-spyware programs, that I use have not found. This speaks to the high quality of many competing anti-malware applications, and not to any short comings in SUPERAntiSpyware.

A simple, intuitive, and easy to use interface makes SUPERAntiSpyware straightforward to setup, customize and run, for both less experienced and expert users alike.

One extra feature in this anti-malware product caught my attention however; a repair function which allows the user to recover settings frequently wrecked by malware, and which are often not recoverable despite removal of the malware process. These settings include Internet connections, lost desktops, the ability to edit the registry and frustratingly, access to the task manager.

Since SUPERAntiSpyware does not provide real time protection against infection, like many free versions of anti-malware programs, I would not recommend then, that you use this free version of SUPERAntiSpyware as a stand alone security application since it simply will not offer you adequate protection. Instead, use it only as an on-demand scanner.

Despite this real-time protection shortcoming in the free version, SUPERAntiSpyware deserves its reputation as a first class security application, and it’s definitely worth considering adding to your security toolbox as a secondary line of defense.

As a full fledged security application, with all of its features unlocked; real-time protection, scheduled scanning, and scheduled updating, SUPERAntiSpyware is very well priced at $29.95 US.

Malwarebytes’ Anti-Malware is an excellent choice, as a secondary line of defense. The free version of this speed demon (it’s faster at scanning than any anti-malware program I’ve tested in the last 2 years), with its easy to employ interface, is used by millions of people worldwide to protect their computers.

Spyware Doctor Starter Edition from PC Tools is an excellent choice, as a secondary line of defense. This free version of the award winning program, with its easy to use interface, is used by millions of people worldwide to protect their computers; it’s reported there are a million+ additional downloads every week. Be aware however, there is no real-time protection offered with this version and this is the reason I recommend this application as a secondary scanner only.

Having tested virtually all of the major anti-spyware applications over the past year or more, I’ve settled, for now, on Spyware Terminator primarily due to its strong real-time protection against spyware, adware, Trojans, key-loggers, home page hijackers and other malware threats. Spyware Terminator excels in strong active protection against know and unknown threats. If anything, I find it perhaps a little overly aggressive. On the other hand, better this than the alternative.

AVG Anti-Virus Free now incorporates protection against spyware through a new combined anti-virus and anti-spyware engine as well as a “safe-searching component” which has been incorporated into the new AVG Internet Security Toolbar. This program scans files on access, on demand, and on schedule and scans email incoming and outgoing. I recently added this application to my Windows 7 (beta) machine, and to this point it has performed flawlessly.

With a little luck, some hard work on your part and using the recommended removal tools, you can stomp on Privacy Center, aka PrivacyCenter, rogue software.

Unfortunately, Privacy Center can be installed on a computer system without any action on the part of the user. Delivery methods used by this parasite include dropping a Trojan, disguised as a video codec. It can also be downloaded voluntarily, from rogue security software websites, or from “adult” websites.

Once installed, this parasite can impact a computer in a number of ways including changing Internet browser settings, connecting to the internet, delivering adware, disguising itself to remain hidden from the user, and running as a background process.

The objective of Privacy Center, which is the objective of all Rogue Security Software, is to convince the victim to pay for the “full” version of the application in order to remove what are, in fact, false positives that this program is designed to display on the infected computer in various ways, including fake scan results, pop-ups and system tray notifications.

Generally, reputable anti-spyware software is capable of detecting rogue software if it attempts to install, or on a malware scan. But this is not always the case. Anti-malware programs that rely on a definition database can be behind the curve in recognizing the newest threats.

A good partial solution to this problem is to ensure you have installed, and are running, an anti-malware application such as ThreatFire, free from PC Tools. This type of program operates using heuristics, or behavioral analysis to identify newer threats.

Rogue Security Software unfortunately, is usually very sophisticated and can write itself into multiple parts of the operating system, and in many cases, it can hide its files, registry entries, running process and services, making the infection difficult to find, and extremely difficult to remove.

If you are a victim of Privacy Center, or other Rogue Security Software, the following removal solutions will be very useful.

Removal Solutions:

Malwarebytes, a very reliable anti-malware company, has created a free application to help keep you safe and secure. RogueRemover will safely remove a number of rogue security applications.

You will also have the option of downloading the free version of Malwarebytes’ Anti-Malware, (I recommend that you do so), a highly rated anti-malware application which is capable of removing many newer rogue applications.

411-Spyware.com is an invaluable asset in the battle against rogue software. This site contains tools and instructions for removing most rogue software. If you have an interest in Internet related security issues, I recommend that you bookmark this site.

Bleeping Computer is a web site where help is available for many computer related problems, including the removal of rogue software.

SmitFraudFix, available for download at Geekstogo is a free tool that is continuously updated to assist victims of rogue security applications including the removal of Antispyware 3000.

Please note: A high degree of computer operating system knowledge is a prerequisite to the successful removal of Rogue Security Software. If you lack this experience, it would be preferable that you enlist the aid of a computer savvy friend, or a professional.

Despite using any, or all, of the recommended tools, you may find that Rogue software is still resident on your system. This is possible due to the number of variations involved with this type of malware. In such a case, reformatting of the Hard Drive and a clean installation of the operating system may be the only alternative.

What can you do to ensure you are protected, or to reduce the chances you will become a victim?

The following are actions (familiar to regular readers of this site), that you can take to protect your computer system:

When surfing the web – Stop. Think. Click

Don’t open unknown email attachments

Don’t run programs of unknown origin

Disable hidden filename extensions

Keep all applications (including your operating system) patched

Turn off your computer or disconnect from the network when not in use

Disable Java, JavaScript, and ActiveX if possible

Disable scripting features in email programs

Make regular backups of critical data

Make a boot disk in case your computer is damaged or compromised

Turn off file and printer sharing on your computer.

Install a personal firewall on your computer.

Install anti-virus and anti-spyware software and ensure it is configured to automatically update when you are connected to the Internet

Ensure the anti-virus software scans all email attachments

Be proactive when it comes to your computer’s security; make sure you have adequate software based protection to reduce the chances that your machine will become infected.

I recommend that you ensure that the current anti- malware applications, which you depend on to protect your system, are up to the task by reading “The 35 Best Free Applications” on this site.

Obama Moves Cybersecurity into the White House – President Obama today unveiled a broad-ranging plan to shore up the nation’s digital infrastructure, pledging to elevate cybersecurity on the national security agenda and establish an office in the White House to coordinate efforts across the various agencies.

Stupid way to end piracy – The file itself comes with a Winamp icon on it, so it looks like a regular mp3 file to the user. When the file is clicked it modifies some registry entries related to WinLogon ….

Microsoft to patch new DirectX hole – Microsoft on Thursday said it is working on a security patch for a vulnerability in its DirectX streaming media technology in Windows that could allow someone to take complete control of a computer using a maliciously crafted QuickTime file.

IM account info found online – Crime Security firm Symantec has warned that information relating to instant-messaging accounts such as email addresses and passwords can be easily found online.

Bing search engine launched – Bing is promising to give relevant information with features including Best Match, which identifies the best result for popular queries and Instant Answers, which provides quick results in the body of the first search results page.

90 percent of e-mail is spam, Symantec says – Spammers seem to be working a little bit harder these days, according to Symantec, which reported Tuesday that unsolicited e-mail made up 90.4 percent of messages on corporate networks last month.

When you surf the Internet are you a savvy computer user? Are you aware of the dangers and pitfalls that wait for the typical unsuspecting user? How likely are you to be pounced on by the multitude of scam artists, schemers and cyber-crooks lurking in the shadows, just waiting for victims.

In any given week I speak with 100’s of typical Internet users who generally have the same behavior characteristics while surfing the Internet in that they:

Use a search engine to locate and generate information.

Despite the fact that cyber-crooks continue to be unrelenting in their chase to infect web search results, seeding malicious websites among the top results returned by these engines – the typical user I come into contact with, has little or no knowledge of current conditions and believes search engine output to be untainted, and free of potential harmful exposure to malware.

Sadly, current statistics indicate that web pages continue to be infected with malware at an ever increasing rate. Some estimates suggest that a legitimate website is infected every five seconds!

Trust the information they discover while online to be reliable and credible.

Rogue security software developers, for example, rely on the innate level of trust that typical Internet users’ have developed, to convince users’ to download this type of malicious software.

The vast majority of typical Internet users I speak with are not aware that such a class of software even exists. But it does; and regrettably, it is now widespread.

A rogue security application is an application, usually found on free download and adult websites, or it can be installed from rogue security software websites, using Trojans or manipulating Internet browser security holes.

After the installation of rogue security software the program launches fake or false malware detection warnings. Rogue security applications, and there seems to be an epidemic of them on the Internet currently, are developed to mislead uninformed computer users’ into downloading and paying for the “full” version of this bogus software, based on the false malware positives generated by the application.

Some types of rogue security software have the potential to collect private and personal information from an infected machine which could include passwords, credit card details, and other sensitive information.

Communicate with family and friends by email.

The worldwide Internet population is now estimated to be 1.08 billion users, so the ability to communicate with family and friends has increased dramatically.

Unfortunately however, cyber-crooks are well aware of the opportunities such a large number of unaware potential victims present for illicit monetary gain.

Incredible as it seems, billions (that’s right billions), of spam email messages are generated every hour through so called botnets; zombie computers controlled by cyber-criminals.

The IC³ (Internet Crime Complaint Center) recently stated that these types of attacks against Internet users are occurring with such frequency, that the situation can be called nothing short of “alarming”.

Yet, the majority of typical users, that I meet, are unaware of the very real dangers that spam emails hold for their safety, security and identity protection.

Email scams work because the cyber-crooks responsible use social engineering as the hook; in other words they exploit our curiosity. The fact is, we are all pretty curious creatures and let’s face it, who doesn’t like sensational email topics.

Sensational news alerts, for example, continue be one of the methods cyber-crooks have selected to capture users’ attention, rather than emails offering pharmaceuticals, expensive watches, or other knockoff products.

As I have pointed out in the past on this Blog, the following are actions you can take to protect your computer system, your money and your identity:

Install an Internet Browser add-on such as McAfee SiteAdvisor, which provides detailed test results on a site’s safety; protecting you from security threats including spyware, adware, spam, viruses, browser exploits, and online scams.

Don’t open unknown email attachments.

Don’t run programs of unknown origin.

Disable hidden filename extensions.

Keep all applications (including your operating system) patched.

Turn off your computer or disconnect from the network when not in use.

Disable Java, JavaScript, and ActiveX if possible.

Disable scripting features in email programs.

Make regular backups of critical data.

Make a boot disk in case your computer is damaged or compromised.

Turn off file and printer sharing on the computer.

Install a personal firewall on the computer.

Install anti-virus and anti-spyware software and ensure it is configured to automatically update when you are connected to the Internet.

Ensure the anti-virus software scans all e-mail attachments.

Be proactive when it comes to your computer’s security; make sure you have adequate software based protection to reduce the chances that your machine will become infected.

Finally, a major step you can take to in prevent yourself from becoming a victim of cyber-criminals is to overcome the instinctive response to just “click” while surfing the Internet. That instinctive response poses one of the biggest risks to your online safety and security.

Blogroll

Daves Computer Tips
Our goal is, and always has been, “To become the best source of easy to understand, plain English computer and tech information on the internet while helping others to better understand computers and technology.”

Manitoulin Island Web Design
Pat Keenan here, at your service, but call me POKO – I’m a nighthawk staying up until all hours so if you need to call, kindly do so after 11AM.

Paul Andrew Russell ~ poet
An excellent poetry site written by my good friend. If you’re looking for prose to ponder then, drop in on Paul.

What's On My PC
The intent of this blog is to share my knowledge base of computers, software, gadgets and information technology in terms that is presentable and understandable to ALL; and at the same time feed my obsession for information technology by learning from oth